Indonesi
an
Journa
l
of El
ect
ri
cal Engineer
ing
an
d
Comp
ut
er
Scie
nce
Vo
l.
12
,
No.
3
,
Decem
ber
201
8
, p
p.
1
0
81
~
1
0
86
IS
S
N: 25
02
-
4752, DO
I: 10
.11
591/ijeecs
.v1
2
.i
3
.pp
1
0
81
-
1
0
86
1081
Journ
al h
om
e
page
:
http:
//
ia
es
core.c
om/j
ourn
als/i
ndex.
ph
p/ij
eecs
Emp
owering
E
-
g
overnan
ce with
E
-
voting
Amarjee
t
Sin
gh
1
, R
am
akan
th
Kum
ar
P
2
,
Nag
araj
G
Choll
i
3
1
Viveka
nand
a
In
stit
ute of Te
chno
log
y
,
Jag
at
pur
a,
Jaipur
(Ra
ja
sth
a
n)
India
-
303012
2
Dept
of
Inform
at
ion
Scie
n
ce &
Engg,
R
V Col
lege
of Engin
ee
rin
g,
Beng
al
uru
,
K
arn
ataka
,
Indi
a
Art
ic
le
In
f
o
ABSTR
A
CT
Art
ic
le
history:
Re
cei
ved
Dec
23
, 201
7
Re
vised Jan
10
, 2018
Accepte
d
J
ul
25, 2
018
Advanc
es
in
In
form
at
ion
and
Com
m
unic
at
ions
Te
chnol
og
y
(
ICT)
hav
e
impact
ed
th
e
societ
y
in
m
an
y
wa
y
s.
B
e
it
edu
ca
t
ion,
he
al
th
ca
r
e,
m
edi
a
o
r
gover
nance,
th
e
tra
nsform
at
io
n
is
visibl
e.
As
indi
vidua
l
ent
ities
li
k
e
educ
a
ti
on
or
he
al
th
ca
re
s
y
st
ems
have
alrea
d
y
i
m
ple
m
ent
ed
IC
T
to
ce
r
tain
ext
en
t,
e
-
gover
n
anc
e
is
y
et
to
m
ake
a
signific
ant
progre
ss
ev
en
though
seve
ral
initiativ
e
s
are
und
ertake
n
.
E
-
gov
ern
an
ce
m
ea
ns
ac
t
ivi
t
ie
s
li
ke
vo
ti
ng
,
administra
tion,
fina
nc
ia
l
tra
nsa
ct
ion
etc.,
ar
e
en
abled
using
aut
om
at
io
n
s
y
stems
.
Thi
s
pa
per
discusses
one
par
t
of
the
e
-
g
over
nance;
e
-
vo
t
ing
.
As
e
-
voti
ng
empow
er
s gove
rnm
ent
,
th
ere
are
lot
of
challe
ng
es
in
imple
m
ent
ing
th
e
e
-
voti
ng
s
y
s
te
m
conside
ring
se
c
urity
thr
ea
ts
and
conf
ide
n
ti
a
li
t
y
invol
ved
in
it
.
Onlin
e
voti
n
g
(e
-
voti
ng)
ne
eds
to
be
deplo
y
ed
as
m
ore
conve
ni
ent,
rel
a
ti
ve
l
y
sec
ur
e
and
le
ss
res
ourc
e
consum
ing
s
y
stem.
E
-
vo
ti
ng
s
y
st
em
should
ensure
c
onveni
en
ce
for
peopl
e
t
o
be
ab
l
e
to
a
cc
ess
the
s
y
stem
from
per
sonal
or
publ
ic
computer
wit
h
sec
urity
and
c
onfide
ntial
ity
.
T
he
pre
senc
e
of
e
-
voti
ng
s
y
s
tem
with
al
l
th
e
n
ec
essar
y
se
cur
ity
m
ea
sures
an
d
conve
ni
ence
ca
n
be
a
pote
nt
i
al
soluti
on
for
l
ow
vote
r
turnout
at
the
poll
s.
T
he
pre
sented
work
demons
tra
t
es
an
on
li
ne
e
-
v
oti
ng
proto
t
y
pe
s
y
stem
c
al
l
ed
Se
cur
eV.
The
proposed
m
odel
ac
hie
v
es
spec
if
ic
ta
sks
namel
y
,
m
ai
nta
ini
ng
the
anon
y
m
i
t
y
of
the
vote
r
,
enc
r
y
pt
ion
of
the
v
ote
,
in
te
gri
t
y
ch
ec
k
and
avo
ids
sec
ond
ti
m
e
voti
ng.
Ke
yw
or
ds:
E
-
go
verna
nce
Encr
y
ption
E
-
voti
ng
Secu
rity
Copyright
©
201
8
Instit
ut
e
o
f Ad
vanc
ed
Engi
n
ee
r
ing
and
S
cienc
e
.
Al
l
rights re
serv
ed.
Corres
pond
in
g
Aut
h
or
:
Am
arj
eet
Sin
gh,
Vive
kan
a
nda
I
ns
ti
tute o
f
Tec
hnology,
Jagatp
ur
a
, J
ai
pur
(
Ra
j
ast
ha
n)
INDIA
-
3030
12
.
Em
a
il
:
a
m
ar.66.07@
gm
ail.co
m
1.
INTROD
U
CTION
In
t
he
c
urren
t e
le
ct
ion
proc
ess
, a
vote
r
ca
sts
vo
te
i
n
voti
ng
sta
ti
on
s.
T
he v
oter
is al
lo
wed
to vote afte
r
ph
ysi
cal
ver
i
ficat
ion
of
neces
sary
do
c
um
ents.
On
ce
,
the
do
cum
ents
are
ver
ifie
d,
the
per
s
on
is
a
giv
e
n
a
ballot
wh
ic
h
ca
nnot
be
r
eu
sed
. T
he b
al
lot do
e
s not
r
eveal t
he
act
ua
l i
den
ti
ty
. Th
e
tradit
ion
al
m
eth
ods a
re esta
blished
and
tr
us
te
d
by
par
ti
es
as
the
disruptio
n
is
not
easy
.
I
n
the
existi
ng
vo
ti
ng
pr
oc
ess,
it
is
no
t
easy
to
at
ta
ck
as
there
is
a
gr
eat
er
cha
nce
of
be
ing
ca
ught
a
nd
the
re
will
be
ph
ysi
cal
e
vide
nce.
As
th
e
ne
w
ge
ne
rati
on
vo
te
rs
pr
e
fer
el
ect
ron
ic
voti
ng,
it
ha
s
bec
om
e
the
ne
ed
of
the
ho
ur.
T
his
is
re
vealed
i
n
the
s
ur
ve
y
done
by
t
he
Publi
c
Po
li
cy
I
ns
ti
tute
of
Ca
li
for
nia.
In
te
r
net
voti
ng
is
the
c
hoic
e
of
m
or
e
tha
n
50
%
res
ponde
nts
in
t
he
a
ge
gro
up
of
18
-
44
as
pe
r
the
su
r
veys
cond
ucted.
Sec
ur
it
y
is
the
m
ai
n
con
cer
n
as
the
ne
twork
an
d
inte
rn
et
relat
ed
at
ta
cks
are
untracea
b
l
e
at
severa
l
oc
casi
on
s
.
Also,
there
are
c
ha
nces
that
at
ta
cks
m
ay
be
al
l
around
t
he
world
.
Ed
ucati
ng
vo
t
ers
is
ano
the
r
issue
wi
th
e
-
voti
ng
as.
Users
are
no
t
com
pu
te
r
prof
ic
ie
nt
and
can’
t
use
the
e
-
vo
ti
ng
syst
em
easi
ly
.
Edu
cat
i
ng
t
he
vote
rs
i
n
us
i
ng
e
-
vo
ti
n
g
syst
em
is
a
no
t
her
iss
ue.
It
cannot
be
as
s
um
ed
that
al
l
vo
te
rs
are
c
om
pu
te
r
prof
ic
ie
nt
a
nd
they
will
us
e
the
e
-
voti
ng
sy
stem
s
with
eas
e.
E
-
voti
ng
s
houl
d
be
desig
ne
d
in
such a
way that i
t
shou
l
d be easy
to use.
E
-
voti
ng
deliv
ers
fast,
c
onve
nient
a
nd
c
os
t
Eff
ect
ive
Se
rv
i
ce
Deli
ve
ry
if
al
l
the
sec
ur
it
y
co
ncerns
ar
e
addresse
d.
E
-
voti
ng
inc
reases
the
par
ti
ci
pation
of
pe
ople
wh
ic
h
is
now
dr
a
w
back
in
th
e
dem
ocr
acy
.
Curren
t
syst
e
m
s
us
e
sever
al
sec
ur
it
y
m
easur
es
s
uch
as
crypto
gr
ap
hy
fo
r
sec
ure
co
m
m
un
ic
at
ion
.
Tech
nical
and
secure
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1
0
81
–
1
0
86
1082
at
tribu
te
s
of
a
good
e
-
vo
ti
ng
syst
em
inclu
de
accu
racy,
ver
ifia
bili
ty
,
pri
vacy,
c
onve
ni
ence,
flexibili
ty
an
d
m
ob
il
i
ty
[1
]
.
A
syst
e
m
can
be
cal
le
d
reli
able
and
acc
ur
a
te
if
there
is
no
cha
nce
f
or
al
te
rati
on
of
cast
ed
vote
.
The
syst
em
sh
ou
l
d
al
s
o
en
sur
e
that
the
valid
at
ed
vote
ca
nnot
be
el
i
m
inate
d.
A
Syst
e
m
is
ver
i
fiable
if
a
nyone
can
in
dep
e
nde
ntly
ver
ify
that
al
l
vo
te
s
ha
ve
been
c
ounte
d
correct
ly
.
A
syst
e
m
can
be
cal
le
d
dem
ocr
at
ic
if
it
den
ie
s
the
voti
ng b
y
non el
igible v
oter
, pr
ov
i
des v
ot
ing o
ption f
or eli
gib
le
vo
te
r on
ly
on
c
e.
Grow
i
ng
intere
st
has
been
ob
serv
e
d
i
n
rece
nt
ye
ars
in
e
-
voti
ng
as
it
pro
vid
es
a
way
to
m
ake
vo
ti
ng
m
or
e
conve
nient
an
d
al
s
o
i
nc
reases
t
he
par
ti
ci
pation
pe
rce
ntage
i
n
el
ect
ion
pr
ocess.
Tr
aditi
on
al
syst
e
m
s
hav
e
to
be
rep
la
ce
d
by
e
-
vo
ti
ng
sy
stem
s
in
fu
tu
re
.
E
-
vo
ti
ng
is
th
e
qu
ic
kest,
e
ff
i
ci
ent,
eco
nom
i
cal
and
e
ff
ic
ie
nt
way
to
co
nduct
el
e
ct
ion
s.
I
n
this
work
a
new
a
ppr
oach
has
be
en
pro
po
se
d
f
or
de
velo
pm
ent
of
e
-
vo
ti
ng
s
yst
e
m
wh
ic
h
is m
or
e
secur
e
d
a
nd
reli
able.
Fig
ure
1 d
epict
s t
he
e
xisti
ng
voti
ng m
od
e
s.
Figure
1. V
otin
g
Mo
des
2.
RE
LATE
D
W
ORK
In
t
he
la
st
de
cades,
a
n
e
nor
m
ou
s
a
m
ou
nt
of
li
te
ratu
re
on
el
ect
ronic
voti
ng
has
bee
n
de
velo
pe
d.
As
el
ect
r
on
ic
voti
ng
co
nc
ept
is
gai
ning
m
o
m
entum
,
effor
ts
ha
ve
be
gun
t
o
dev
el
op
re
al
-
worl
d
so
luti
ons
[
2]
,
[
3].
Ele
ct
ronic
vo
ti
ng
poses
ne
w
chall
en
ges
as
the
us
e
of
i
ns
ec
ur
e
I
nter
ne
t
resu
lt
s
in
secur
it
y
br
eac
hes
[
4].
These
sec
ur
it
y
con
ce
rn
s
a
nd
chall
eng
es
ha
ve
to
be
reso
l
ved
to
i
ncr
eas
e
the
trust
w
ort
hin
es
s
of e
-
vo
ti
ng.
Un
i
ver
sal
ver
i
fiabil
it
y
con
ce
pt
was
i
ntr
oduc
ed
by
Sako
e
t
al
.,
[5]
that
e
m
ph
asi
zes
the
i
m
po
rtanc
e
of
el
ect
ion
a
udit
by
cat
egor
iz
ing
the
ve
ri
fiabil
it
y.
The
e
-
voti
ng
stu
dies
app
ly
2
ca
te
gories;
ind
iv
idu
al
var
ia
bili
ty
and
un
i
ver
sal
ver
i
fiabil
it
y.
In
in
div
id
ual
ver
ifi
abili
ty
,
a
sender
can
ve
rify
the
reac
ha
bili
ty
of
hi
s
m
essage to
de
s
ti
nation
but n
ot
o
f othe
r
vote
rs
. Unive
rsal v
e
r
ifia
bili
ty
is the
cat
egory in wh
ic
h
pa
rtic
ipants
can
broa
dcast
inf
orm
ation
that
c
an
be
us
e
d
by
third
par
ty
f
or
ve
rificat
ion
wh
et
her
t
he
el
ect
ion
wa
s
pe
r
form
ed
pro
per
ly
or
not.
It
is
no
t
sim
ple
to
i
m
ple
m
e
nt
e
-
voti
ng
in
reali
ty
.
Me
rcu
ri
et
al
.,
[
6]
worked
on
t
he
issues
li
ke
confli
ct
s that a
rise b
et
ween se
crecy
and acc
uracy
r
e
qu
ir
em
e
nts.
P
r
ob
le
m
s also pop
up
fro
m
the p
r
oce
dur
e that
is
fo
ll
owe
d
i
n
current
voti
ng
syst
e
m
s.
Ther
e
is
sti
ll
no
voti
ng
syst
em
wh
ic
h
ca
n
be
cal
le
d
as
safety
-
c
riti
ca
l
in
dev
el
op
m
ent
and
dep
l
oym
ent
as
op
ine
d
by
so
m
e
research
er
s
[7
]
.
Be
cause
of
the
pro
pri
et
ary
natur
e
of
s
yst
e
m
com
po
ne
nts
a
nd
ot
her
facto
rs,
se
rio
us
iss
ues
hav
e
bee
n
create
d
i
n
le
gally
bindin
g
el
ect
ion
s.
As
e
-
voti
ng
needs
netw
ork
infr
a
struct
ur
e
,
threats
ex
ist
in
var
i
ou
s
form
s
l
eadin
g
to
untr
ust
worthy
syst
em
s.
Thr
eat
s
suc
h
as
DOS
(
De
nial
of
Ser
vice)
,
m
alw
ares
,
w
orm
s,
Troja
n
horses
et
c.,
ha
ve
destr
uctive
im
pact
on
t
he
a
vaila
bi
li
ty
of
the
syst
em
.
These
ca
n
af
fec
t
the
a
vaila
bili
ty
of
e
-
vo
ti
ng
syst
em
s
fo
rci
ng
th
e
go
vern
m
ents
to
c
onduct
re
-
el
ect
ion
s.
Wor
m
rep
la
ces
the
portio
ns
of
th
e
data
with
ra
ndom
data
an
d
he
nce
it
is
da
ng
e
r
ou
s
[
8].
T
his
ca
n
br
i
ng
dow
n
th
e
integrity
of
vo
ti
ng
syst
em
as
there
is
a
c
han
ce
of
it
m
a
y
aff
ect
the
re
su
lt
s
of
voti
ng.
Troja
n
horses
a
re
de
structive
c
om
pu
te
r
pro
gram
s
th
at
delet
e
or
m
od
ify
im
po
rtant
file
s
from
co
m
pu
te
r.
T
her
e
a
r
e
al
s
o
chan
ce
s
of
pas
swor
d
ste
al
in
g
and p
la
ntin
g h
arm
fu
l vir
us
es.
This lea
ds
t
o
f
raud
ulent sc
he
m
es
.
Har
i
K.
P
rasad
et
al
.,
[
9]
a
na
ly
zed
the
secu
r
it
y
of
el
ect
r
on
i
c
voti
ng
m
achines
i
n
India.
T
he
a
uthor
s
op
i
ned
that
the
re
is
a
need
to
reco
nsi
der
m
e
chan
ism
s
to
ac
hieve
secu
re
d
and
tra
nspare
nt
vo
ti
ng
syst
em
that
su
it
s
nati
on
al
values
an
d
re
quirem
ents.
V
V
PA
T
(
Vo
te
r
ve
rifiable
a
udit
tr
ai
l)
was
sug
ge
ste
d
that
is
in
us
e
i
n
ot
he
r
co
untrie
s
.
V
VPAT
c
ombines
el
ect
r
onic
record
sto
red
with
a
pap
e
r
vo
te
recor
d
th
at
can
be
a
udit
ed
by
hand.
Ele
ct
ron
ic
Vo
ti
ng
Ma
chines
do
not
hav
e
up
datab
le
so
ftwa
re
but
sti
ll
VV
P
A
T
can
be
ad
de
d
by
interp
os
in
g
on
the
cable
betw
een
ballot
unit
an
d
the
c
ont
r
ol
unit
.
T
her
e
exists
an
oth
e
r
op
ti
on
i
n
the
f
or
m
of
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Em
po
we
ri
ng E
-
gover
nance w
it
h
E
-
v
otin
g
(
A
ma
rje
et
Sing
h
)
1083
PCOS
(
pr
eci
nc
t
-
co
un
t
opti
cal
scan
)
w
her
e
the
ballot
paper
ballots
are
fill
ed
by
vo
te
rs,
s
cann
e
d
by
a
voti
ng
m
achine at the
po
ll
in
g
sta
ti
ons
b
e
fore they
a
r
e p
la
ced
in
a
ba
ll
ot b
ox.
The
ou
tc
om
e
of
the
li
te
ratu
re
su
r
vey
is
that
t
her
e
e
xists
a
s
ol
ution
f
or
sec
uri
ty
con
ce
rns
of
el
ect
roni
c
vo
ti
ng
but al
so i
nd
ic
at
e m
or
e
secur
e
d, tr
us
t
worthy syst
em
is n
ee
ded f
or the
pr
ese
nt
po
li
ti
cal
co
ndit
ion
s
.
3.
PRO
P
OSE
D MO
DEL:
Sec
ureV
3.1.
S
ystem
Model
The
pro
pose
d
m
od
el
a
chieves
four
points:
Ano
nym
it
y
of
the
vo
te
r,
enc
r
ypte
d
vote
,
integrity
chec
k
and
rest
rict
ing
the
el
igible
vote
r
to
cast
the
vote
only
on
ce
.
Ther
e
are
m
ai
nly
two
us
er
ty
pe
s
f
or
voti
ng
portal
us
a
ge.
O
ne
as
adm
inist
rator
a
nd
ot
her
as
vote
r.
The
adm
inist
rator
ta
sk
s
in
cl
ud
e
creati
on
of
can
did
at
e
li
st
an
d
reg
ist
rati
on
of
vo
te
r.
T
he
anonym
i
ty
of
vo
te
ca
sti
ng
is
m
a
intai
ned
f
or
al
l
vote
rs.
Se
cret
ba
ll
ot
is
a
voti
ng
m
et
ho
d
in
w
hich
a
vote
r'
s
cho
ic
es
i
n
an
el
ect
ion
or
a
re
fer
e
ndum
are
anonym
ou
s
.
I
n
the
pr
opose
d
work,
t
his
is
ac
hieve
d
by
se
nding
a
sec
ret
ke
y
to v
oter
.
T
his
key
is use
d
f
or
loggin
g
to voti
ng
por
ta
l. Onc
e
th
e
vo
te
r
logs
in,
t
he
vote
r
is
pro
vid
e
d
with
the
li
st
of
cand
i
da
te
s.
On
ce
t
he
vote
is
cast
ed,
the
vote
is
encry
pted
and
st
or
e
d.
T
he
vo
te
r
ca
nnot
cast
th
e
vo
te
again
as
the
portal
does
not
per
m
it
s.
Table
1
de
picts
add
i
ti
on
al
inf
or
m
at
ion
of
the pr
ocess foll
ow
e
d.
Table
1.
e
-
voti
ng pr
ocess
i
n
S
ecur
e
V
M
od
el
Activ
ity
Ro
le
Techn
ical asp
ect
Vo
ter
Reg
istratio
n
Ad
m
in
istrato
r
Secret
k
e
y
is
gen
er
ated
Can
d
id
ate
List Pr
e
p
aration
Ad
m
in
istrato
r
Vo
tin
g
Vo
ter
Vo
te is encr
y
p
ted
u
sin
g
public k
ey
a
n
d
sto
red
An
o
n
y
m
ity
is
m
ai
n
tain
ed
Vo
te Co
u
n
tin
g
Ad
m
in
istrato
r
Vo
te is decr
y
p
ted
u
sin
g
secre
t key
Integ
rity
ch
eck d
o
n
e
Co
rr
u
p
ted
/
Manip
u
lated
vo
te no
t counted
The
voti
ng server
h
as
b
ee
n b
uilt
w
it
h
t
he
f
ol
lowing stre
ngths:
a)
Access c
ontr
ol m
echan
is
m
allo
ws
access
to
t
he vo
ti
ng
ser
ve
r
if at l
east
t
wo d
if
fer
e
nt
us
ers
are
l
ogge
d on.
b)
Com
pr
ehensi
ve
audit
d
at
a a
va
il
abili
ty
in
the ser
ver.
c)
No provisi
on t
o kno
w
the
vot
ing
proc
es
s e
xc
ept num
ber
of votes cast
ed
s
o far.
d)
Ser
ver
s
sto
ps
i
n
case
of ir
rev
e
rsible
pro
blem
s.
The v
oter
inte
r
face
has
the
fol
lowing
f
un
ct
io
nalit
y:
1)
Id
e
ntific
at
ion a
nd au
t
hen
ti
cat
ion o
f v
oter.
2)
In
it
ia
ti
ng
t
he p
olli
ng
possible
on
ly
on
ce
.
3)
Re
su
m
e p
olli
ng a
fter
recov
e
r
y i
n
case
br
ea
kdow
ns
.
4)
Perfo
rm
self
-
checks.
3.2.
Te
chnic
al
A
spec
ts of th
e M
od
el
The
m
od
el
use
d
asy
m
m
et
ric
crypto
gr
a
phy
wh
e
re
the
syst
e
m
us
es
pairs
of
keys:
publi
c
keys
a
nd
pr
i
vate
keys.
Publi
c
keys
are
dissem
inated
widely
an
d
pr
ivate
key
is
known
only
to
the
owner.
Vo
t
e
encr
y
pted
with
public
key
can
be
dec
rypte
d
only
with
pri
vate
key.
The
pr
ivate
key
c
annot
be
pract
ic
al
l
y
der
i
ved f
ro
m
the
public key
. Fi
gure
2
i
nd
ic
a
te
the asym
m
etr
ic
crypt
ogra
phy process
.
Figure
2. Asy
m
m
e
tric
Cryptogra
ph
y
The
vo
te
r
ca
nnot
cast
t
he
vote
f
or
seco
nd
tim
e
as
the
portal
does
not
al
low
it
.
On
c
e
the
voti
ng
process
is
ove
r
,
the
adm
inist
rator
dec
rypts
t
he
vo
te
s
usi
ng
secret
key
an
d
vo
te
co
unti
ng
is
do
ne.
Pr
i
or
t
o
this
,
integrity
chec
k
is
done
to
e
nsure
t
hat
no
vote
has
bee
n
m
anipu
la
te
d.
An
i
nteg
rity
check
m
odule
has
been
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1
0
81
–
1
0
86
1084
integrate
d
in
t
he
portal
with
bu
il
t
-
in
intel
li
gen
ce
.
Fig
ure
3
pro
vid
e
s
the
two
scr
eens
hots
of
the
ap
pl
ic
at
ion
dev
el
op
e
d.
Figure
3. Scree
ns
hots
of the
a
pp
li
cat
ios
3.2.
1.
M
D
5 A
lgo
ri
t
hm
In
te
gr
it
y
chec
k
is
done
us
i
ng
MD
5
al
gor
it
h
m
.
The
MD5
f
unct
ion
a
lgorit
hm
ta
kes
an
in
pu
t
of
arb
it
ra
ry
le
ngth
a
nd
produc
es
12
8
bits
long
m
essage
dig
est
.
T
he
dig
est
is
al
s
o
c
al
le
d
as
"
has
h"
or
"fin
gerpr
i
nt" of the
in
pu
t.
MD5 is s
uitable
for i
nteg
rity
ch
e
ck of
the
vote
s
cast
ed usin
g v
oter
i
nterf
ace
.
Figure
4. MD
5 has
hing al
gorithm
MD5
al
gorith
m
h
ashing proc
ess
:
a)
The
m
essage
is
padde
d
to
m
ake
it
s
le
ng
t
h
448
bits
or
51
2
bits.
P
ad
ding
is
al
so
perform
ed
even
if
t
he
m
essage
le
ngt
h
is
al
read
y
448
bits
or
512
bits.
This
is
a
chieve
d
by
a
ddin
g
“
1”
bit
to
the
m
essage
a
nd
app
e
ndin
g
“0”
bits
so
that
the
le
ngth
bec
om
es
con
grue
nt
to
44
8
m
o
d
51
2.
Mi
nim
um
on
e
bit
a
nd
m
axi
m
u
m
5
12
bits are a
ppen
de
d.
b)
MD5
us
es
32
bits
le
ng
t
h
w
ords
t
hat
co
ns
ti
tute
buf
fer
wh
i
ch
are
nam
ed
A,
B,
C
&
D.
These
words
are
init
ia
li
zed as
word A:
01
23
45 67
word B:
89 a
b cd e
f
word C:
f
e
dc
ba 98
word D:
76
54
32 10
c)
MD5 uses
a
ta
ble K t
hat
has 64 el
em
ents.
The follo
wing
f
un
ct
io
n
is
u
se
d t
o
c
om
pu
te
elem
ents.
Ki = a
bs
(
sin(i
+ 1)) *
232
w
he
re
Ki is the el
e
m
ent n
um
ber
i.
d)
MD5
al
s
o uses
four a
ux
il
ia
ry
functi
ons. Ea
c
h of t
hese
f
un
c
ti
on
s ta
kes 32
-
bit w
ords
a
s in
pu
t a
nd
pro
du
c
es
on
e
32
-
bit
wor
d
as
outp
ut.
L
ogic
al
operat
or
s
AND,
NO
T
, XOR a
nd
OR a
re
us
ed
for p
r
oc
essing.
F(
X
,Y,Z)
=
(X an
d Y) o
r (not
(X) a
nd Z)
Evaluation Warning : The document was created with Spire.PDF for Python.
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci
IS
S
N:
25
02
-
4752
Em
po
we
ri
ng E
-
gover
nance w
it
h
E
-
v
otin
g
(
A
ma
rje
et
Sing
h
)
1085
G(X,
Y,
Z
)
=
(
X
and Z
) or (
Y
a
nd not(Z
))
H(X,
Y,
Z
)
=
X xor
Y
xor Z
I(X,
Y,
Z
)
=
Y x
or (X
or
not(Z
)
)
e)
Buffers
(A,B,C
,D
)
c
on
te
nt is
m
ixed
with
the
words
of the
input
us
in
g
a
ux
il
ia
ry f
un
ct
i
on
s
. After
com
pleti
on
of
al
l rounds, t
he buffe
rs A,B
,C
D
c
on
ta
in
the
MD5 dig
est
of
the origi
nal in
put
.
3.2.2.
H
om
om
orph
ic
Encr
yp
ti
on
Fo
r
e
ncr
y
ption,
ho
m
om
or
ph
ic
encr
ypti
on
ha
s
been
use
d.
In
ho
m
or
phic
en
crypti
on,
us
e
f
ul
op
erati
ons
can
be
pe
rfo
rm
ed
on
e
ncr
y
pte
d
val
ues
with
out
dec
ryptin
g
t
hem
first.
Give
n
ci
pher
te
xts
t
hat
enc
rypt
π
1
,
.
.
.
,
π
t
,
any
on
e
can
ge
ner
at
e
ci
ph
e
rtext
that
encr
y
pts
f(
π
1
,
.
.
.
,
π
t
)
fo
r
a
ny
desired
f
un
c
ti
on
f,
as
lo
ng
as
that
functi
on
can
be
eff
ic
ie
ntly
com
pu
te
d.
T
he
or
i
gin
al
m
essa
ge
w
ould
be
t
he
AE
S
key
e
ncr
y
pted
un
de
r
so
m
e
public
key
pk1,
the
hom
om
or
ph
ic
f
un
ct
ion
decr
y
pts
the
AES
key
under
pk
1a
nd
encr
ypti
ng
it
again
unde
r
pk2.
In
this
m
od
el
,
AES
key,
KK,
is
encr
ypte
d
unde
r
public
key
pk1,
that
is,
Enc
pk1
(
K
).
If
ff
is
desig
ne
d
to
de
crypt
ci
ph
e
r
te
xts
us
in
g
the
c
orres
pondin
g
secret
key,
that
is,
f
(sk
1
,
Enc
pk1
(K))
=
K,
the
e
quat
i
on
ind
ic
at
e the
tra
ns
f
or
m
at
ion
without
af
fecti
ng
the origi
nal in
f
or
m
at
ion
.
f
(En
c
pk2
(s
k
1
)
,E
nc
pk2
(E
nc
pk1
(K)))=Enc
pk2
(K)
(1)
Adva
nced
Enc
ryptio
n
Stan
da
rd
(AES)
al
gor
it
h
m
us
ed
i
n
th
e
m
od
el
acce
pts
the
boc
k
siz
e
of
128
bit
s
and
ch
oice
of
t
hr
ee
keys
–
128
bits,
19
2
bits
an
d
25
6
bits.
The
e
ncr
y
ption
co
ns
ist
s
of
10
rou
nd
s
f
or
12
8
bits,
12 ro
unds
f
or
192 bit
s a
nd
14
rou
nd
s
for 2
56
bits.
These
te
ch
nolog
ie
s
stre
ngth
en
the
pr
opose
d
e
-
voti
ng
syst
e
m
with
avail
abili
ty
,
i
nteg
rity
an
d
confide
ntial
it
y.
Fig
ur
e
5 in
dicat
e the buil
di
ng
blo
c
ks
of the
prop
os
ed
syst
e
m
.
Figure
5. Buil
di
ng
blo
c
ks o
f
e
-
voti
ng syst
em
•
In
te
gr
it
y
im
pli
es
protect
in
g
a
gainst
data
c
orrecti
on.
I
n
t
he
pro
po
se
d
m
odel
,
this
is
ac
hie
ved
MD
5
has
hi
ng
al
gorithm
.
•
Confide
ntial
it
y
i
m
plies
secur
i
ng
in
div
id
ual
protect
ion
an
d
restrict
ive
data.
This
is
achie
ved
us
i
ng
pri
va
te
key co
nce
pt.
•
Av
ai
la
bili
ty
i
m
pl
ie
s
gu
ara
nt
eei
ng
co
nv
e
ni
ent
and
de
pe
nd
a
ble
acce
s
s
to,
and
util
iz
at
ion
of
da
ta
.
The pr
opose
d
m
od
el
inco
r
por
at
es this usi
ng
easy
to use
vo
t
er in
te
r
face a
nd sec
ur
e
d ser
ve
r.
4.
CONCL
US
I
O
N
In
t
his
w
ork
,
a
ne
w
ap
proac
h
has
bee
n
dev
e
lop
e
d
f
or
e
-
voti
ng
process
tha
t
ta
kes
care
of
al
l
require
d
secur
it
y
co
nce
rn
s
.
T
he
Sec
ureV
m
od
el
ha
s
i
m
pr
ove
d
buil
t
in
sec
ur
it
y
m
easur
es
th
at
can
im
pr
ov
e
the
trustwo
rthin
es
s
of
e
-
voti
ng
process.
T
he
pro
po
s
ed
m
od
el
s
ta
nd
s
out
am
on
g
existi
ng
te
c
hn
i
qu
e
s
in
te
r
m
s
of
reli
abili
ty
,
us
abili
ty
,
vo
te
r
fr
i
end
ly
a
nd
ea
sy
process
flo
w.
This
ca
n
be
c
ost
eff
ect
ive
al
s
o
com
par
e
d
to
othe
r
m
od
el
s.
The p
r
opos
e
d
syst
em
can be a
pote
nt
ia
l cand
i
date f
or e
-
vo
ti
ng
syst
e
m
s u
nder c
on
siderati
o
n.
A
fu
t
ur
e
w
ork
is
plann
ed
to
include
a
dd
it
io
nal
secur
it
y
m
easur
e
s
and
im
pro
ving
the
use
r
interfac
e
desig
n. The
p
la
nn
e
d w
ork
al
s
o i
nclu
des v
oice input at
vo
te
r
i
nterf
ace
e
nd.
C
o
n
f
id
en
tia
lit
y
I
n
teg
r
it
y
Av
ailab
ilit
y
E
-
v
o
ti
n
g
S
y
s
te
m
Evaluation Warning : The document was created with Spire.PDF for Python.
IS
S
N
:
2502
-
4752
Ind
on
esi
a
n
J
E
le
c Eng &
Co
m
p
Sci,
Vo
l.
12
, N
o.
3
,
Dece
m
ber
2
01
8
:
1
0
81
–
1
0
86
1086
REFERE
NCE
S
[1]
Abdall
a
Al
-
Am
ee
n
and
Sam
ani
Ta
l
ab
,
The
T
ec
h
nic
a
l
fe
asibilit
y
and
fe
asibi
l
ity
o
f
e
-
vot
ing,
T
he
I
nte
rnational
Ara
b
Journal
of
Infor
mation
Techno
lo
gy,
Vol.
10
,
No
.
4,
Ju
ly 2013
[2]
Cet
inkay
a
,
O.
&
Cet
ink
a
y
a
,
D.
T
owards
Sec
ure
E
-
Elec
t
ions
in
T
urke
y:
Re
quirem
ent
s
and
Prin
ci
p
le
s
,
Int
ern
a
ti
ona
l
W
orkshop
on
D
epe
ndab
il
i
t
y
and
Secur
ity
in
e
-
G
over
nm
ent
(DeSeGov’07)
-
In
P
roce
edi
ngs
of
A
RE
S’07
,
Vi
enna,
Aus
tri
a,
2007,
pp
.
903
-
907
.
[3]
Cranor
,
L.
&
C
ytron,
R.
S
ensus:
A
Sec
urity
-
Conscious
El
ectronic Pol
li
ng
Syst
em
for t
he
Inte
rnet
,
I
n
Proce
edi
ngs of
the
30
th
Annua
l H
awa
ii
In
te
rn
at
i
onal
Conf
ere
n
ce on
S
y
s
te
m
Sci
e
nce
s
,
W
a
il
e
a,
Ha
waii
,
1997
[4]
Kohno
T,
Stubbl
efi
e
ld
A,
Rubin
AD
&
W
al
la
ch
DS
.
,
Anal
ysis
of
an
el
e
ct
ronic
voting
system
.
IE
E
E
s
y
m
posium
on
sec
urity
and
priv
acy
,
2004
[5]
Sako,
K.
&
Ki
l
ia
n
J.
R
ec
e
ipt
-
F
ree
Mi
x
-
Type
V
oti
ng
S
che
me:
A
Prac
ti
ca
l
Sol
uti
on
to
th
e
Im
ple
menta
ti
on
o
f
A
Vot
ing
Boot
h
,
In
Proce
ed
ings o
f A
dvanc
es
in
Cr
yptol
og
y
EUROCRY
PT’95,
Malo
,
Franc
e
,
1995
,
p
p.
393
-
403
.
[6]
Merc
uri,
R.
,
“
Rebe
cc
a
Merc
uri
'
s
Statem
ent
on
El
ec
tron
ic
Votin
g”,
[Online
]
,
2000,
Avail
abl
e
:
htt
p://ww
w.not
a
ble
software
.
com
/RMs
ta
te
m
ent.ht
m
l
[
7]
Mcga
ley
,
M.,
&
GIBS
ON
,
J.
P.
,
EV
o
ti
ng:
A
Safe
t
y
Criti
cal
Syste
m
.
T
ec
h
.
Rep.
NU
IM
-
CS
-
TR
-
2003
-
02,
N
U
I
Ma
y
nooth
,
Com
pute
r
Sc
ie
nc
e
D
epa
rtment
,
2003
,
htt
p:
//
ww
w.c
s.
m
a
y
.
ie
/re
se
arc
h
/re
ports/2003/in
dex.
html#02.
[8]
Falk
H.
,
“
Com
pute
r
In
trusions
a
nd
Attacks,” T
h
e
Elec
tron
ic L
ibr
a
r
y
,
vol
.
17
,
no
.
2
,
pp
.
115
-
119
,
1
999.
[9]
P.
Jaga
de
eswara
ia
h
,
M.R
.
Pav
an
Kum
ar,
Se
c
ureDBaaS
Mode
l
for
Ac
c
essing
Enc
rypt
ed
C
loud
Database
,
TE
LKOM
NIK
A
Indone
sian
Jour
nal
of
E
le
c
tri
c
al
Engi
ne
eri
ng,
Vo
l.
16
,
No
.
2
,
Nov
ember
2015,
pp.
333
~ 340.
[10]
L
Ferre
tti,
M
Cola
ja
nn
i,
M
Marc
hetti.
Distr
ibut
ed
,
conc
urr
ent
,
and
ind
ependent
access
to
enc
rypte
d
cl
ou
d
databases
.
IE
EE T
ran
sa
ct
ion
son
Para
llel and
Dist
ribut
ed
S
y
st
ems
,
2013;
99
:
2013
.
[11]
A.
Ben
Cha
rke
,
M.
Ch
abi
,
M.
Fakir,
Con
tribu
ti
on
to
the
Sec
u
rity
of
the
Infor
mation
Syste
m
,
TE
LKOM
NIK
A
Indone
sian
Jour
nal
of
E
le
c
tri
c
al
Engi
ne
eri
ng,
Vo
l.
16
,
No
.
1
,
Oct
ober
2015,
pp
.
1
54
~ 166.
[1
2]
Kenne
th
G
Pat
e
rson.
A
cry
ptog
raphic
tour
of
t
he
IPse
c
standa
rds
,
Inform
at
ion
sec
urity
techni
ca
l
rep
ort
.
2006
.
11(2):
72
-
81
[13]
Pierre
-
Ala
in
Fouque,
Ga
ët
an
Le
u
ren
t,
Phong
Q
N
gu
y
en
,
Full
K
e
y
-
Rec
over
y
At
tac
ks
on
HM
AC/N
MA
C
-
MD
4
and
NMAC
-
M
D5,
L
NCS
.
2007;
46
2
2:
13
-
30.
[14]
S
y
ed
Um
ar
,
P.
Ga
y
a
thri
,
N.
Yongende
r
Nath
,
N.
Bashwanth
,
Ro
y
y
uru
Srik
ant
h,
Data
Int
eg
rity
and
Sec
uri
t
y
[
DIS
]
Based
Protoc
ol
for
Cogn
it
ive
Rad
io
Ad
Hoc
Net
works
,
Indone
sian
Jour
nal
of
Elec
tri
c
al
Engi
ne
eri
ng
an
d
Com
pute
r
Scie
n
ce
,
Vol.
5,
No.
1
,
Janua
r
y
2017
,
pp.
187
~ 195
[15]
Johns
on
J,
Kali
ski
B.
Publi
c
-
Ke
y
Cr
y
p
togra
ph
y
Standa
rds
(PK
CS
)
#1:
RS
A
Cr
y
ptogra
ph
y
Spec
i
fic
a
ti
ons
Versio
n
2.
1.
2013.
ww
w.i
et
f
.
org. Net
wor
k
W
orking
Grou
p.
Evaluation Warning : The document was created with Spire.PDF for Python.